Telecommunication networks architecture, Basic Computer Science

Telecommunication Networks Architecture is the manner in which the components of thenetwork are organized and integrated to provide telecommunication services to users ofthe network. The objective of this course is to give the student a view of the technologyand other influences on the way networks are constructed.There are many different types of telecommunication networks, each with its own uniquefeatures. However, each network comprises hardware components (switches, routers,transmission, terminals) and sets of rules for the operation of the network (protocols).Large telecommunications networks such as the telephone network or the Internet areextremely complex in their structure and operation. To develop the architecture of suchnetworks a historical approach is taken in this course. Primitive networks such astelegraph networks are constructed using the same basic principles that exist in today'scomplex networks, but are much easier to understand. Technological advances haveenabled more complex networks to be implemented, but at the same time lowering thecost per user of providing service.In the development of network architecture there are major influences other thantechnology. In particular, government policy with respect to competition has forcedmajor changes in the way telephone network have been developed. Such influences andthe results are covered superficially in this course; an in-depth examination being morewithin the scope of a law school or business school course. 

Posted Date: 7/8/2012 11:23:31 AM | Location : United States







Related Discussions:- Telecommunication networks architecture, Assignment Help, Ask Question on Telecommunication networks architecture, Get Answer, Expert's Help, Telecommunication networks architecture Discussions

Write discussion on Telecommunication networks architecture
Your posts are moderated
Related Questions
what is computer topology .

what is the computer science

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Memory The memory unit is used for the storage of binary coded information. Information consists of instructions and data where: • Instructions are the coded pieces of infor

Question 1 . Explain briefly the functional units of a computer Question 2 . What do you mean by an interrupt Question 3 . Explain fetching a word from the memory

Problem 1. What are Micro-operations? Explain Micro operations of the Fetch cycle. Defining Micro-operations Its explanation of the fetch cycle 2. Differen

Artificial Intelligence Artificial Intelligence is difficult science to explain, as it has fuzzy borders with  computer science, mathematics,  philosophy, physics,  psychology

what is the logic diagram for the Boolean expression x''y + xy'' + xz

In this technique, the kernel knows about and handles the threads. No runtime system is required in this case. In place of thread table in each process, the kernel has a thread tab

each of the following functions has the form f(x ) = (ax+b) mod n. assume that each function has type N base n arrow N base n, so that we can think of f as a cipher for an alphabet